AWS Certified Security - Speciality Exam Prep Guide
This AWS Certified Security – Specialty Exam Prep Guide covers the exam's content, improving your study skills, and helpful Amazon resources.
Jun 08, 2023 • 17 Minute Read
Preparing for any AWS certification exam can be tough! It takes time, it takes focus, and as you move from the associate into the professional and specialty-level certs, it takes a deeper understanding of AWS services and how they work together. At A Cloud Guru, we design our certification courses to help you master the topics you’ll need to know to pass your exams. But we’ve also found that knowing what to expect ahead of time can help you as you work your way through a course, and can even give you a better chance of passing your exam the first time. In this post, we’ll be looking at the AWS Certified Security - Specialty exam, what it covers, what you need to know, where you can find additional resources, and strategies you can use when you actually sit the exam. In this blog post, we’ll cover:
- the content areas of the exam
- how to tackle those pesky multiple-choice questions
- tips to help you improve your study skills
- uber-helpful Amazon resources
Get more than certified
Join A Cloud Guru and get access to all of our courses, labs, quizzes, and our new learning paths, which take you step-by-step from novice to guru in your chosen area of the cloud.
A great time to get AWS certified
Why get AWS certified? At the risk of sounding dramatic, you couldn’t pick a better time to enter the AWS Security Specialty field. The market is absolutely ripe for new AWS security specialists! Here are just some of the reasons why it’s a great time to go for this type of certification: A huge need. I don’t have to tell you that cloud computing is in demand, and companies are eager to find IT professionals who have a rich background in cloud security. A massive skills gap. There is an enormous skills gap worldwide when it comes to Amazon security know-how, providing those who get certified plenty of skies-the-limit opportunities. A status boost. Being certified shows that you’re the go-to cloud guru in AWS. It’s a sure way to get noticed within your own organization and by employers and recruiters looking to hire engineers who have this high-level expertise. A bigger paycheck. According to Forbes, the median salary for those who are AWS-cloud-certified is nearly $150k. So it really pays to pass the exam and show you have the right skills at the right time.Helpful resources
We get it. The prospect of preparing for the AWS Security Speciality exam is stressful. But you don’t have to go it alone. There are heaps of support tools and resources, many of them free, that complement everything else you’ll be doing to prepare for the exam, such as working with the tools, taking our course, and honing your test-taking skills. Here are three excellent resources worth checking out: Amazon’s whitepapers: These whitepapers cover every aspect of AWS Security Speciality exam. Admittedly, they’re about as entertaining to read as the ingredients on the back of a ketchup bottle. But they’re invaluable, just the same. You’ll actually really appreciate spending a lot of time with these whitepapers. AWS re:invent videos: You can find a bunch of these videos on Youtube. Many are short enough that you can watch them on your lunch hour. And if you’re already familiar with a topic, you can save time by zipping through parts at double-speed. Amazon’s FAQs: You can find a generous listing of FAQs that discuss all the technologies you’ll need to become familiar with to prep for AWS security specialty exam.AWS security specialty domains
The AWS exam is divided into 5 content areas or domains:- Incident Response
- Logging and Monitoring
- Infrastructure Security
- Identify Access Management (IAM)
- Data Protection.
Domain 1: Incident Response (12%)
This domain covers detecting, responding to, and recovering from security incidents. And there are 2 very common security issues you must get familiar with: compromised EC2 instances and exposed access and secret access keys. Let’s delve into each a bit:- Compromised EC2 instance — This section covers what to do if one of your EC2 instances becomes compromised. (Some examples include changing your security groups, removing internet access, or isolating the compromised EC2 instance so it can’t compromise anything else.)
- Exposed access keys and secret access keys — What do you do if access keys are accidentally exposed? (You’d be surprised how many people call me in a panic about this problem. Never put access keys on GitHub!) This section focuses on disabling and deleting access keys so they can’t be used against you, and other effective solutions.
- AWS Config (configuration management)
- AWS CloudTrail (IAM auditing)
- Amazon CloudWatch (logging)
- Amazon GuardDuty (threat detection)
- AWS Lambda (response automation)
- Amazon Inspector (infrastructure security scans)
- Whitepapers — Take a look at the section called “Security and Compliance.” Be sure to spend time with the “AWS Security Incident Response Guide,” which is an overview of the fundamentals of responding to security incidents in an AWS Cloud environment. Click here to download the PDF.
- Videos — Be sure to watch “Incident Response in the Cloud.”
- FAQs — Config, CloudTrail, CloudWatch, GuardDuty, Lambda, and Inspector.
Domain 2: Logging and Monitoring (20%)
It’s essential that you have an effective logging and monitoring strategy within your AWS account. For this domain, you’ll need to know how to design a strategy and use it to effectively troubleshoot security issues. The main services you’ll want to know are:- CloudWatch (logging)
- CloudTrail (IAM auditing)
- Athena (querying log files with data stored in S3)
- Config (configuration management)
- Inspector (security scans)
- Whitepapers — I recommend the “Logging in to AWS” PDF which you can download here.
- Videos — Check out “Log, Monitor and Analyze your IT with Amazon CloudWatch.”
- FAQs — CloudWatch, CloudTrail, Athena, Config, and Inspector.
Domain 3: Infrastructure Security 26%
This is the largest domain, so be sure to spend plenty of time preparing for it. It covers designing and troubleshooting secure networks within AWS. Have you completed the AWS Certified Solutions Architect Associate certification? If so, you’ll have a leg up, because you already know about infrastructure security and how to set up secure networks and Virtual Private Cloud (VPC) resources within AWS. Elevate your AWS game to new heights and obtain one of the most challenging and well-respected certifications in IT, the AWS Solution Architect Professional certification. For this domain, you’ll want to focus on these issues:- Edge security (think the perimeter of your network)
- Host-based security of your EC2 instances
- DDoS mitigation within AWS
- Protecting against common exploits such as cross-site scripting (XSS) and SQL injection
- AWS WAF (Web Application Firewall)
- AWS Shield for DDoS protection
- CloudFront and Route 53 (these have built-in protection)
- Elastic Load Balancer (ELB) (protective mechanisms for your VPC)
- EC2 Auto Scaling (absorb any type of DDoS attack by scaling your infrastructure and preventing the attack from taking down your service)
- VPC and Network Access Control Lists (NACL) and Security groups (protect your hosts and your EC2 environment)
- Artifact (to demonstrate to regulators that the AWS services you’re using are compliant with regulatory requirements)
- [Note that Artifact offers all sorts of helpful documentation. For example, if you’re working in an industry that has to adhere to the Payment Card Industry Data Security Standard (PCI DSS), you can log in to Artifact and download the documentation and certification that demonstrate that the AWS services you are using are truly PCI DSS-compliant.]
- Macie (protects personally identifiable information (PII) within any document that is stored within an S3 bucket.)
- [It actually scans all your documents and will let you know if there exists any hidden PII that might need to be encrypted.]
- Whitepapers — There are loads of whitepapers for this domain, such as “VPC Connectivity Options,” “DDoS Best Practices,” “AWS Security Best Practices,” “Well Architected Framework Security Pillar,” and “Overview of Security Processes.”
- Videos — “VPC Connectivity Options,” “DDoS Best Practices,” “Advanced Security Masterclass,” and “Well Architected Framework Security Pillars".
- FAQs — WAF, AWS Shield, CloudFront, Route 53, VPC, ELB, EC2 Auto Scaling, Lambda, Direct Connect, Artifact, and Macie.
Domain 4: Identity and Access Management (IAM) (20%)
This section tests your knowledge of designing and troubleshooting your authentication and authorization policy. You will need to have a solid grasp on that policy and be able to translate and troubleshoot. Make sure you’re familiar with these services:- CloudTrail (IAM auditing)
- Multi-factor authentication (MFA) (particularly for the root account)
- Active Directory Federation (ADF) (includes federating access to AWS resources with an on-premises active directory installation)
- Whitepapers — “Overview of Security Processes” and “AWS Security Best Practices.”
- Videos — “IAM Policy Master” and “IAM Policy Ninja” (they are similar), “ID Federation for AWS” (important to watch since many of us often don’t get much hands-on experience doing ADF and it’s hard to replicate it in a lab environment)
- FAQs — “IAM,” “Cognito,” (for web identity federation and federating access with web ID providers such as Facebook, Google, and Amazon), “CloudTrail,” and “AWS Organizations” (on how to set up permissions at an organizational level).
Domain 5: Data Protection (22%)
To test well on this domain, you’ll need to know how to protect your data using encryption. That includes creating and managing keys, controlling the use of encryption across a wide range of AWS services and in applications, and designing and troubleshooting an encryption strategy. Pay particular attention to key management services (KMS)! I can’t emphasize this enough. Be sure you understand the difference between encryption at rest and in transit and the different technologies you’ll need to encrypt your data. And, it bears repeating: get as much KMS hands-on experience as you can. Play around with the tools by encrypting data, unencrypting it, and re-encrypting it. → Data Protection Resources:- Whitepapers — “KMS Best Practices and Encrypting Data at Rest”
- Videos — “KMS Best Practices and Encryption Deepdive” (This covers the same material as the whitepaper does.)
- FAQs — “KMS” (Worth reading twice! It’s critical for passing this domain.) Pay particular attention to the different types of keys involved in KMS and how you rotate the different keys, such as when to use automatic or manual key rotation.
Tackling tricky questions in 3 steps
To crush this exam and its multiple-choice questions, it’s imperative to develop an effective exam strategy. Our tried-and-true strategy includes 3 simple steps:- Get clear on what the question is asking
- Eliminate likely wrong answers
- Select the best answer
Start simulating your exam
Our Exam Simulator lets you take all the practice runs you need, so you can go into your actual exam with undeniable confidence, and maybe even a bit of a swagger.
Sample question
Let’s put this strategy to work by attacking a sample question. This irksome question could appear as part of the Data Protection domain: After reading through the question, we’ll write down some keywords. I wrote down “located in your data center” because that seems important. I called out “highly confidential” which tells me that we might want to encrypt the data. Finally, given the frequent crashes that were noted, I selected “network is unreliable.” Next, I’ll draw my grid and add my column headers A through E. Now let’s take a look at the possible answers and figure out which ones can be eliminated.- Use a VPC Endpoint so that the data never leaves Amazon’s network
- Access the data using a secure port
- Use a VPN between your VPC and the data center over a Direct Connect connection
- Use a VPN between your VPC and the data center and access the database using a secure port
- Configure Direct Connect between the VPC and your data center